Subcategories

Data Warehousing and Data Mining Techniques for Cyber Security (Repost)

Posted By: AvaxGenius
Data Warehousing and Data Mining Techniques for Cyber Security (Repost)

Data Warehousing and Data Mining Techniques for Cyber Security by Anoop Singhal
English | PDF | 2007 | 166 Pages | ISBN : 0387264094 | 7.55 MB

Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, tremendous amount of data collected and stored in large databases has far exceeded our human ability to comprehend–without the proper tools. There is a critical need for data analysis that can automatically analyze data, summarize it and predict future trends. In the modern age of Internet connectivity, concerns about denial of service attacks, computer viruses and worms are extremely important.

How To Secure Your WordPress Site & Protect Files Safely

Posted By: Sigha
How To Secure Your WordPress Site & Protect Files Safely

How To Secure Your WordPress Site & Protect Files Safely
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 378 MB
Genre: eLearning Video | Duration: 20 lectures (55m) | Language: English

Discover How to Secure Your Valuable WordPress Site and Protect Your Files..Even If You Know Nothing About Security.

Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time (Repost)

Posted By: AvaxGenius
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time (Repost)

Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time by Chet Hosmer
English | PDF,EPUB | 2018 | 186 Pages | ISBN : 1484236998 | 11.12 MB

Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources.

Evolution of Cyber Technologies and Operations to 2035

Posted By: AvaxGenius
Evolution of Cyber Technologies and Operations to 2035

Evolution of Cyber Technologies and Operations to 2035 by Misty Blowers
English | PDF,EPUB | 2015 | 201 Pages | ISBN : 3319235842 | 4.09 MB

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security.

Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense

Posted By: AvaxGenius
Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense

Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense by Kristin E. Heckman
English | PDF,EPUB | 2015 | 263 Pages | ISBN : 3319251317 | 6.10 MB

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme.

The Absolute Beginners Guide to Cyber Security and Hacking (Updated 1/2020)

Posted By: Sigha
The Absolute Beginners Guide to Cyber Security and Hacking (Updated 1/2020)

The Absolute Beginners Guide to Cyber Security and Hacking (Updated 1/2020)
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 3.69 GB
Genre: eLearning Video | Duration: 29 lectures (9h 14m) | Language: English

2020 Launch! Become a Cyber Security Specialist, Build technical capability in ethical hacking &web application security.

10 Ways to Be Smart Online

Posted By: readerXXI
10 Ways to Be Smart Online

10 Ways to Be Smart Online
by Lesley Ito
English | 2018 | ASIN: B07KM19853 | 39 Pages | PDF | 2.24 MB

Black Hat Approach to Hacking

Posted By: Sigha
Black Hat Approach to Hacking

Black Hat Approach to Hacking
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 1.87 GB
Genre: eLearning Video | Duration: 22 lectures (4h 7m) | Language: English

Learn how a hacker hacks into the system and learn how to secure them from getting hacked

Ethical Hacking: System Hacking [Updated 1/3/2020]

Posted By: IrGens
Ethical Hacking: System Hacking [Updated 1/3/2020]

Ethical Hacking: System Hacking [Updated 1/3/2020]
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 25m | 223 MB
Instructor: Lisa Bock

Ethical Hacking: Sniffers [Updated 1/13/2020]

Posted By: IrGens
Ethical Hacking: Sniffers [Updated 1/13/2020]

Ethical Hacking: Sniffers
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 20m | 155 MB
Instructor: Lisa Bock

Ethical Hacking: Social Engineering

Posted By: IrGens
Ethical Hacking: Social Engineering

Ethical Hacking: Social Engineering
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 25m | 284 MB
Instructor: Lisa Bock

Cyberdanger: Understanding and Guarding Against Cybercrime (Repost)

Posted By: AvaxGenius
Cyberdanger: Understanding and Guarding Against Cybercrime (Repost)

Cyberdanger: Understanding and Guarding Against Cybercrime by Eddy Willems
English | EPUB | 2019 | 231 Pages | ISBN : 3030045307 | 37.39 MB

This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media.

Unauthorised Access: Physical Penetration Testing For IT Security Teams

Posted By: step778
Unauthorised Access: Physical Penetration Testing For IT Security Teams

Wil Allsopp, Kevin Mitnick, "Unauthorised Access: Physical Penetration Testing For IT Security Teams"
2009 | pages: 308 | ISBN: 0470747617 | EPUB | 3,9 mb

Hacking VoIP: Protocols, Attacks, and Countermeasures (Repost)

Posted By: step778
Hacking VoIP: Protocols, Attacks, and Countermeasures (Repost)

Himanshu Dwivedi, "Hacking VoIP: Protocols, Attacks, and Countermeasures"
2008 | pages: 236 | ISBN: 1593271638 | PDF | 5,2 mb

Black Hat Go: Go Programming For Hackers and Pentesters

Posted By: hill0
Black Hat Go: Go Programming For Hackers and Pentesters

Black Hat Go: Go Programming For Hackers and Pentesters
by Tom Steele

English | 2020 | ISBN: 1593278659 | 368 Pages | EPUB | 4 MB